Mostafavi et al., 2019 - Google Patents
Fog computing architectures, privacy and security solutionsMostafavi et al., 2019
View PDF- Document ID
- 1903607834693026619
- Author
- Mostafavi S
- Shafik W
- Publication year
- Publication venue
- Journal of Communications Technology, Electronics and Computer Science
External Links
Snippet
Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks where it provides services closer to users characterized by closer proximity to end-users and bigger geographical distribution, local resource pooling, latency reduction …
- 238000003860 storage 0 abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mostafavi et al. | Fog computing architectures, privacy and security solutions | |
US11750659B2 (en) | Cybersecurity profiling and rating using active and passive external reconnaissance | |
Abiodun et al. | A review on the security of the internet of things: Challenges and solutions | |
US20220014560A1 (en) | Correlating network event anomalies using active and passive external reconnaissance to identify attack information | |
AlAhmad et al. | Mobile cloud computing models security issues: A systematic review | |
US11601475B2 (en) | Rating organization cybersecurity using active and passive external reconnaissance | |
US11303659B2 (en) | Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence | |
US12058177B2 (en) | Cybersecurity risk analysis and anomaly detection using active and passive external reconnaissance | |
Nartey et al. | On blockchain and IoT integration platforms: current implementation challenges and future perspectives | |
Lee et al. | On security and privacy issues of fog computing supported Internet of Things environment | |
US12041091B2 (en) | System and methods for automated internet- scale web application vulnerability scanning and enhanced security profiling | |
Yakubu et al. | Security challenges in fog-computing environment: a systematic appraisal of current developments | |
US10979452B2 (en) | Blockchain-based malware containment in a network resource | |
US20210281609A1 (en) | Rating organization cybersecurity using probe-based network reconnaissance techniques | |
Khan et al. | A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing | |
Gulzar et al. | Internet of things security: a survey and taxonomy | |
Alotaibi | A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities | |
US20230362142A1 (en) | Network action classification and analysis using widely distributed and selectively attributed sensor nodes and cloud-based processing | |
Gupta | Non-functional requirements elicitation for edge computing | |
US20230283641A1 (en) | Dynamic cybersecurity scoring using traffic fingerprinting and risk score improvement | |
Islam et al. | A comprehensive data security and forensic investigation framework for cloud-iot ecosystem | |
Benaddi et al. | A review: Collaborative intrusion detection for IoT integrating the blockchain technologies | |
Yan et al. | Graph mining for cybersecurity: A survey | |
Rajesh et al. | Network forensics investigation in virtual data centers using elk | |
Prithi et al. | Trust Management Framework for Handling Security Issues in Multi-cloud Environment |